General
-
Target
6a98d63304df05f55265f42ad5f8e2e4be63c35181a103f1328f60e96e3f0e0f
-
Size
6.8MB
-
Sample
220626-xnjgfacack
-
MD5
f2e78426d5fd410725ceb00c4f821903
-
SHA1
13bccee212ce368477259b317cb36d1b65f43f58
-
SHA256
6a98d63304df05f55265f42ad5f8e2e4be63c35181a103f1328f60e96e3f0e0f
-
SHA512
737e94d4932139b1b5944658b1c498effdbdf0ee881c8e35889cb5cfc1309eab5bdf4fa97366262bf4c8860fff9407f92e095c1bc003b40c17791dbc211abc89
Static task
static1
Behavioral task
behavioral1
Sample
6a98d63304df05f55265f42ad5f8e2e4be63c35181a103f1328f60e96e3f0e0f.msi
Resource
win7-20220414-en
Malware Config
Extracted
remcos
Win32LUX
144.91.79.86:4783
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
Win32_64.exe
-
copy_folder
Logs
-
delete_file
false
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%UserProfile%
-
keylog_crypt
false
-
keylog_file
log.dat
-
keylog_flag
false
-
keylog_folder
Logs
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
GDSGFDS42424FSAF-RP31EK
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
- take_screenshot_title
Targets
-
-
Target
6a98d63304df05f55265f42ad5f8e2e4be63c35181a103f1328f60e96e3f0e0f
-
Size
6.8MB
-
MD5
f2e78426d5fd410725ceb00c4f821903
-
SHA1
13bccee212ce368477259b317cb36d1b65f43f58
-
SHA256
6a98d63304df05f55265f42ad5f8e2e4be63c35181a103f1328f60e96e3f0e0f
-
SHA512
737e94d4932139b1b5944658b1c498effdbdf0ee881c8e35889cb5cfc1309eab5bdf4fa97366262bf4c8860fff9407f92e095c1bc003b40c17791dbc211abc89
-
Babadeda Crypter
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-